1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
15

PLEASE HELP!!!!! MUCH OBLIGED!!!!

Computers and Technology
1 answer:
Nonamiya [84]3 years ago
3 0
1) a word processing program. (.doc)
2) a spreadsheet program (.xls)
3) a presentation program (.ppt)
4) a file compression program. (.zip)
You might be interested in
On a Windows network share, if the user can add, edit, and delete files and folders within the LabFiles folder, what type of acc
Colt1911 [192]

Answer:

Modify

Explanation:

When people like your family or friends can access a computer, then the need to have permissions would certainly come in handy. There are six basic types of permission one can choose from and the modify option is one of them. It simply grants the holder the ability to read and write files and subfolders and also allows for the deletion of folders and files.

6 0
3 years ago
Which of the following is NOT a type of insurance fraud?
inessss [21]

Answer:

Arson

Explanation:

Because arson is setting something on fire on purpose to cause damage.

The others all are some form or another of insurance fraud.

8 0
3 years ago
Read 2 more answers
Data warehousing and data mining mean the same thing when applied to CRM
Nata [24]
This is false. Data warehousing is storing the data. Data mining is retrieving and analyzing data from the data warehouse.
5 0
4 years ago
Read 2 more answers
Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
stira [4]
I believe it is B hope this helped you<span />
5 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in t
    9·1 answer
  • How many unique ip addresses can be made in a fixed-length ip address system using 6 bits?
    8·1 answer
  • Select the correct answer.
    15·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?
    12·2 answers
  • Public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -&gt; System.out.println(nam
    12·1 answer
  • (03.05 LC
    14·1 answer
  • Question is in photo
    11·1 answer
  • The excerpt is a sample works-cited list.
    5·2 answers
  • ____ uses a computer to design and test new products and modify existing ones. Computer-aided manufacturing Just-in-time design
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!